SiteShadow
Back to vulnerability library

CWE-201 Sensitive Data in Sent Data

What this means

SiteShadow flagged sensitive information being included in data sent outside the trusted boundary (HTTP responses, emails, webhooks, third-party API calls, analytics events).

Why it matters

Sensitive data in responses can be intercepted or misused.

Safer examples

1) Return only what the client needs (DTO allowlists)

res.json({ id: user.id, name: user.name }); // not the full user object

2) Strip sensitive fields before sending to vendors

For analytics/telemetry, avoid raw emails, tokens, auth headers, and full request bodies.

3) Treat outbound payloads as "public by default"

Assume anything sent out of process can be stored forever.

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage